dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1694235 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html - Third Party Advisory | |
References | () https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658 - Patch, Third Party Advisory | |
References | () https://github.com/dom4j/dom4j/commits/version-2.0.3 - Patch, Third Party Advisory | |
References | () https://github.com/dom4j/dom4j/issues/87 - Third Party Advisory | |
References | () https://github.com/dom4j/dom4j/releases/tag/version-2.1.3 - Release Notes, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8%40%3Cdev.velocity.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32%40%3Cdev.velocity.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51%40%3Cnotifications.freemarker.apache.org%3E - | |
References | () https://security.netapp.com/advisory/ntap-20200518-0002/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4575-1/ - Third Party Advisory | |
References | () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuApr2021.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2021.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - | |
References | () https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory |
Information
Published : 2020-05-01 19:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10683
Mitre link : CVE-2020-10683
CVE.ORG link : CVE-2020-10683
JSON object : View
Products Affected
oracle
- data_integrator
- fusion_middleware
- endeca_information_discovery_integrator
- jdeveloper
- primavera_p6_enterprise_project_portfolio_management
- rapid_planning
- financial_services_analytical_applications_infrastructure
- retail_customer_management_and_segmentation_foundation
- enterprise_data_quality
- storagetek_tape_analytics_sw_tool
- application_testing_suite
- communications_diameter_signaling_router
- communications_unified_inventory_management
- utilities_framework
- retail_order_broker
- health_sciences_empirica_signal
- webcenter_portal
- agile_plm
- communications_application_session_controller
- retail_xstore_point_of_service
- retail_integration_bus
- retail_price_management
- enterprise_manager_base_platform
- documaker
- flexcube_core_banking
- insurance_rules_palette
- health_sciences_information_manager
- business_process_management_suite
- banking_platform
- insurance_policy_administration_j2ee
netapp
- oncommand_api_services
- snapcenter
- oncommand_workflow_automation
- snapmanager
- snap_creator_framework
opensuse
- leap
dom4j_project
- dom4j
canonical
- ubuntu_linux
CWE
CWE-611
Improper Restriction of XML External Entity Reference